Analysis
-
max time kernel
84s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
18-04-2022 15:30
Static task
static1
Behavioral task
behavioral1
Sample
e5ef77f621f085a8508b4dbad7fdac5e4a77b3a9bab4f4c8ad59d579bf88e10a.dll
Resource
win7-20220414-en
windows7_x64
0 signatures
0 seconds
General
-
Target
e5ef77f621f085a8508b4dbad7fdac5e4a77b3a9bab4f4c8ad59d579bf88e10a.dll
-
Size
667KB
-
MD5
667a3f054a634a5d2f12adb71b1b3049
-
SHA1
305691499cb521c282a92628baeb8d16c4f33002
-
SHA256
e5ef77f621f085a8508b4dbad7fdac5e4a77b3a9bab4f4c8ad59d579bf88e10a
-
SHA512
24e3829440d4cb8b2a0d7b755a7e7625f3d2ac69815928a5e8ccb57585be51ad4ca3a1988d716fc80bc050b3badd445f2f35af6e32a69afbaa021c3a20338b04
Malware Config
Extracted
Family
zloader
Botnet
dll26
Campaign
dll26
C2
https://eecakesconf.at/web982/gate.php
Attributes
-
build_id
7
rc4.plain
rsa_pubkey.plain
Signatures
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4468 wrote to memory of 2612 4468 rundll32.exe 81 PID 4468 wrote to memory of 2612 4468 rundll32.exe 81 PID 4468 wrote to memory of 2612 4468 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5ef77f621f085a8508b4dbad7fdac5e4a77b3a9bab4f4c8ad59d579bf88e10a.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:4468 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\e5ef77f621f085a8508b4dbad7fdac5e4a77b3a9bab4f4c8ad59d579bf88e10a.dll,#12⤵PID:2612
-
C:\Windows\SysWOW64\msiexec.exemsiexec.exe3⤵PID:932
-
-